IEEE Security & Privacy
IEEE Security & Privacy > 2009 > 7 > 1 > 78 - 81
IEEE Security & Privacy > 2009 > 7 > 1 > 82 - 85
IEEE Security & Privacy > 2009 > 7 > 3 > 13 - 19
IEEE Security & Privacy > 2009 > 7 > 3 > 37 - 44
IEEE Security & Privacy > 2009 > 7 > 3 > 29 - 36
IEEE Security & Privacy > 2009 > 7 > 3 > 82 - 85
IEEE Security & Privacy > 2009 > 7 > 3 > 72 - 74
IEEE Security & Privacy > 2009 > 7 > 4 > 44 - 51
IEEE Security & Privacy > 2009 > 7 > 5 > 82 - 85
IEEE Security & Privacy > 2009 > 7 > 5 > 44 - 51
IEEE Security & Privacy > 2009 > 7 > 5 > 29 - 35
IEEE Security & Privacy > 2009 > 7 > 5 > 36 - 43
IEEE Security & Privacy > 2009 > 7 > 5 > 14 - 20
IEEE Security & Privacy > 2009 > 7 > 6 > 57 - 59
IEEE Security & Privacy > 2010 > 8 > 5 > 48 - 56
IEEE Security & Privacy > 2011 > 9 > 1 > 40 - 48
IEEE Security & Privacy > 2011 > 9 > 1 > 64 - 72
IEEE Security & Privacy > 2011 > 9 > 3 > 70 - 72
IEEE Security & Privacy > 2011 > 9 > 4 > 24 - 31
IEEE Security & Privacy > 2012 > 10 > 1 > 46 - 54